CVE-2025-59810: Information disclosure in Fortinet FortiSOAR on-premise
An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests
AI Analysis
Technical Summary
CVE-2025-59810 is a medium-severity vulnerability identified in Fortinet FortiSOAR versions 7.3.0 through 7.6.2, including both on-premise and PaaS deployments. The root cause is improper access control mechanisms within the FortiSOAR platform, which allow an attacker with valid authentication credentials but limited privileges to craft specific requests that bypass intended access restrictions. This results in unauthorized disclosure of sensitive information, potentially including security incident data, configuration details, or other confidential operational information managed by FortiSOAR. The vulnerability does not affect system integrity or availability but poses a significant confidentiality risk. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity, requires privileges but no user interaction, and impacts confidentiality at a high level. FortiSOAR is widely used for security orchestration, automation, and response (SOAR), making this vulnerability particularly concerning as it could expose sensitive security workflows and data to unauthorized internal users or compromised accounts. No public exploits have been reported yet, but the presence of this flaw necessitates prompt remediation to prevent potential exploitation by threat actors who gain authenticated access.
Potential Impact
For European organizations, the impact of CVE-2025-59810 can be significant due to the sensitive nature of data handled by FortiSOAR platforms, including security incident details, automated response playbooks, and integration credentials. Unauthorized disclosure could lead to exposure of internal security processes, aiding attackers in evading detection or escalating attacks. Confidentiality breaches may also violate data protection regulations such as GDPR, resulting in legal and financial repercussions. Organizations in critical sectors like finance, energy, telecommunications, and government are particularly vulnerable because they rely heavily on SOAR platforms for incident management and rapid response. The medium severity rating reflects the absence of direct system compromise or denial of service but highlights the risk of internal data leakage. Since exploitation requires authentication, the threat is primarily from malicious insiders or attackers who have compromised legitimate user credentials. The lack of known exploits in the wild provides a window for proactive defense but should not lead to complacency.
Mitigation Recommendations
1. Apply official patches or updates from Fortinet as soon as they become available to address the improper access control issue. 2. Restrict FortiSOAR access to trusted networks and enforce strict access controls, including network segmentation and VPN requirements. 3. Implement strong multi-factor authentication (MFA) for all FortiSOAR user accounts to reduce the risk of credential compromise. 4. Regularly audit user permissions and remove unnecessary privileges to minimize the attack surface for authenticated users. 5. Monitor FortiSOAR logs for unusual authenticated request patterns that could indicate exploitation attempts. 6. Employ anomaly detection tools to identify suspicious internal activity related to FortiSOAR access. 7. Educate security teams about the vulnerability and ensure incident response plans include steps for potential information disclosure scenarios. 8. Consider temporary compensating controls such as disabling non-essential features or interfaces until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2025-59810: Information disclosure in Fortinet FortiSOAR on-premise
Description
An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests
AI-Powered Analysis
Technical Analysis
CVE-2025-59810 is a medium-severity vulnerability identified in Fortinet FortiSOAR versions 7.3.0 through 7.6.2, including both on-premise and PaaS deployments. The root cause is improper access control mechanisms within the FortiSOAR platform, which allow an attacker with valid authentication credentials but limited privileges to craft specific requests that bypass intended access restrictions. This results in unauthorized disclosure of sensitive information, potentially including security incident data, configuration details, or other confidential operational information managed by FortiSOAR. The vulnerability does not affect system integrity or availability but poses a significant confidentiality risk. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity, requires privileges but no user interaction, and impacts confidentiality at a high level. FortiSOAR is widely used for security orchestration, automation, and response (SOAR), making this vulnerability particularly concerning as it could expose sensitive security workflows and data to unauthorized internal users or compromised accounts. No public exploits have been reported yet, but the presence of this flaw necessitates prompt remediation to prevent potential exploitation by threat actors who gain authenticated access.
Potential Impact
For European organizations, the impact of CVE-2025-59810 can be significant due to the sensitive nature of data handled by FortiSOAR platforms, including security incident details, automated response playbooks, and integration credentials. Unauthorized disclosure could lead to exposure of internal security processes, aiding attackers in evading detection or escalating attacks. Confidentiality breaches may also violate data protection regulations such as GDPR, resulting in legal and financial repercussions. Organizations in critical sectors like finance, energy, telecommunications, and government are particularly vulnerable because they rely heavily on SOAR platforms for incident management and rapid response. The medium severity rating reflects the absence of direct system compromise or denial of service but highlights the risk of internal data leakage. Since exploitation requires authentication, the threat is primarily from malicious insiders or attackers who have compromised legitimate user credentials. The lack of known exploits in the wild provides a window for proactive defense but should not lead to complacency.
Mitigation Recommendations
1. Apply official patches or updates from Fortinet as soon as they become available to address the improper access control issue. 2. Restrict FortiSOAR access to trusted networks and enforce strict access controls, including network segmentation and VPN requirements. 3. Implement strong multi-factor authentication (MFA) for all FortiSOAR user accounts to reduce the risk of credential compromise. 4. Regularly audit user permissions and remove unnecessary privileges to minimize the attack surface for authenticated users. 5. Monitor FortiSOAR logs for unusual authenticated request patterns that could indicate exploitation attempts. 6. Employ anomaly detection tools to identify suspicious internal activity related to FortiSOAR access. 7. Educate security teams about the vulnerability and ensure incident response plans include steps for potential information disclosure scenarios. 8. Consider temporary compensating controls such as disabling non-essential features or interfaces until patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-22T08:19:21.055Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4e74ebaa3baba142a6
Added to database: 12/9/2025, 5:37:18 PM
Last enriched: 1/14/2026, 2:49:57 PM
Last updated: 2/6/2026, 9:37:08 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25732: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui
HighCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumCVE-2026-25544: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in payloadcms payload
CriticalCVE-2026-25516: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-2067: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.